-
This course provides you with opportunities to integrate andapply your information security knowledge.
This course provides you with opportunities to integrate andapply your information security knowledge. Following the case-study approach,you will be introduced to current, real-world cases developed and presented bythe practitioner community. You will design and execute information assurancestrategies to solve these cases.
Topics explored include:
Analysis and problem solving usingcases contracted from real world problems in Information Assuranceincluding:- Selection and application of controls
- Construction of security policies
- Understanding and application of regulatory requirements
- Understanding and application of business constraints
- Communication of risk to non-information assurance professionals
- Identification and remediation of new threats
- Analysis and performance of incident response
- Communication of Information Assuranceprinciples and concepts
- Peer reviewed analysis of each case
- Reading and class explanation of good and bad examples (from news and public sources)
- Reading and peer discussion of current events in Information Assurance
Overview
Syllabus
-
With successful completion of the course students should be able to:
- Describe the nature of security risk in a business and an IT context
- Compare and apply several models for security risk assessment
- Facilitate a risk assessment process and gain consensus on risk-based decisions
- Incorporate risk assessment into an IT security plan